Fine-grained access control using a database proxy